Kong Ingress Controller Image Compromised
A critical security breach was discovered in the Kong Ingress Controller version 3.4.0 when an attacker gained access to Kong's DockerHub
A critical security breach was discovered in the Kong Ingress Controller version 3.4.0 when an attacker gained access to Kong's DockerHub
A new malware campaign has compromised more than 5,000 WordPress websites by creating unauthorized admin accounts and installing a malicious plugin.
Microsoft started the year 2025 by addressing a significant number of security vulnerabilities, with a total of 161 flaws across its software.
Cybersecurity researchers recently uncovered several serious vulnerabilities in SimpleHelp, a remote access software, which could result in information
Cybercriminals identified as "Codefinger" have recently targeted Amazon Web Services S3 buckets, encrypting customer data using AWS’s native encryption tools.
Microsoft researchers have recently identified a significant security vulnerability in macOS that could allow attackers to bypass System
A recently disclosed security vulnerability in the Aviatrix Controller cloud networking platform, tracked as CVE-2024-50603, has been found
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) recently added a second vulnerability impacting BeyondTrust Privileged Remote Access
Hackers believed to be linked to the Kremlin-backed threat actor APT28, also known as Fancy Bear or BlueDelta, have been targeting Kazakhstan
Threat actors have introduced a new tactic known as "transaction simulation spoofing" to steal cryptocurrency. This method targets transaction
© 2025 | CyberMaterial | All rights reserved